Arquitecture 6G
Arquitecture 6G
Arquitecture 6G
Architecture Landscape
The work will be available online open access and governed by the Creative Commons “Attribution-Non
Commercial” License (CC BY-NC), according to https://creativecommons.org/licenses/by-nc/4.0/
Published in Towards Sustainable and Trustworthy 6G: Challenges, Enablers, and Architectural Design by Ömer
Bulakçı, Xi Li, Marco Gramaglia, Anastasius Gavras, Mikko Uusitalo, Patrik Rugeland and Mauro Boldi (eds.).
2023. ISBN 978-1-63828-238-9. E-ISBN 978-1-63828-239-6.
Suggested citation: Mårten Ericson, Bahare Masood Khorsandi, et al. 2023. “Architecture Landscape” in Towards
Sustainable and Trustworthy 6G: Challenges, Enablers, and Architectural Design. Edited by Ömer Bulakçı, Xi
Li, Marco Gramaglia, Anastasius Gavras, Mikko Uusitalo, Patrik Rugeland and Mauro Boldi. pp. 11–39.
Now Publishers. DOI: 10.1561/9781638282396.ch2.
1. The full list of chapter authors is provided in the Contributing Authors section of the book.
2.1 Introduction
The network architecture evolution journey will carry on in the years ahead, driv-
ing a large scale adoption of 5th Generation (5G) and 5G-Advanced use cases with
significantly decreased deployment and operational costs, and enabling new and
innovative use-case-driven solutions towards 6th Generation (6G) with higher eco-
nomic and societal values. The goal of this chapter, thus, is to present the envisioned
societal impact, use cases and the End-to-End (E2E) 6G architecture. The E2E 6G
architecture includes summarization of the various technical enablers as well as the
system and functional views of the architecture.
The design of the 6G architecture is based on the analysis of the societal, eco-
nomic, regulatory, and technological trends, which are discussed in Section 2.1.2.
A summary of the use cases envisioned for 6G is also introduced in Section 2.1.3.
Accordingly, a set of architectural principles has been drawn, upon which the pre-
sented architecture is built. Herein, the main highlights of the 6G system design
are provided, while the details on the various network domains are given in the
subsequent chapters.
11
12 Architecture Landscape
In Section 2.2, the overall architecture description discusses the new stake-
holders in the mobile network ecosystem, and how the architectural work is tak-
ing into account their requirements in all the domains of the network. Specific
design principles that need to be factored in for the new architecture are also
described. Section 2.3 discusses the components of the security architecture, which
are required and must be applied to have security as a design principle for the 6G
architecture. A deep dive into the Management and Orchestration (M&O) archi-
tecture is then presented in Section 2.4. Section 2.5 outlines the summary of this
chapter and presents the outlook.
towards 2030 and beyond, which will be analysed in the following sections. In addi-
tion, regulatory and technological trends that are critical for the design and deploy-
ment of future networks will be discussed, ensuring the vision and the research work
encompass all the essential elements and will lead to a future network design that is
deeply rooted in reality and profoundly benefits humanity in the mid-to-long term.
digital twins (DTs), massive data harvesting from local sensors builds up cap-
illary sub-networks handled by gateways, while in parallel the wide-area net-
work must handle mobility and coverage.
• Trustworthy networks: As more and more aspects of our lives, societies, and
industries become reliant on mobile connectivity, it becomes imperative to
ensure the performance, reliability, and security of the networks so that the
services can be used as intended, when needed, without undue connection
disturbances or access to private data. This will require the network archi-
tecture design to consider the security implications at every step, to avoid a
patchwork of solutions after the fact.
• Sustainable 6G and 6G for sustainability: As one of the major challenges
facing our societies today, the sustainability of our environment, industries,
and the society at large must be ensured to be able to reach the sustain-
able development goals set by, e.g., the United Nations. For 6G, this entails
addressing both the first-order effect of the network, referring to the direct
environmental impacts of the manufacturing and operating of the networks
in terms of energy consumption, CO2 emission and usage of scarce resources,
as well as the second-order effect, referring to how the networks enable
improvements in sustainability with, e.g., improved efficiency in industries,
or a transition from business travels towards virtual business meetings. How-
ever, there are also higher-order effects, also known as rebound effects, that
must be considered, where the improved functionality of the mobile networks
induces a novel behaviour of the users, which could, e.g., increase the total
energy consumption. Moreover, societal sustainability should be addressed,
with new services enabled by 6G meeting societal needs and demands [16].
6G use cases
The societal and economic trends are driving the identification of relevant use cases
for 6G. The Hexa-X project provides a vision on the role of 6G in the evolution
Introduction 19
Telepresence Sustainability
Robots 6G Resilience
Twinning Trust
of society [21–23], accounting for these trends and setting the baseline for the
identification of use cases. Combining the sets of use cases identified by the vari-
ous European projects provides an overview of the envisaged usage enabled by 6G.
These different use cases can be clustered into broad and generic use case fami-
lies, encompassing both evolutionary use cases and revolutionary ones, building
on new functionalities. These generic use case families can be considered from
the perspective of the type of end-user usage involved, as shown in Figure 2.1,
such as:
• Telepresence: Immersive experience is a central theme for various use cases,
with different degrees of immersion, from the evolution of XR experienced
with 5G but with increased mobility, reliability, and scale to a fully immersive
experience, fully merging physical and digital worlds, with various application
areas, both professional and personal (travel, gaming, sports, etc.). This will
leverage both the expansions and evolutions of existing technologies, provid-
ing connectivity as well as incorporating novel functionalities such as local-
ization, sensing, and computational offloading.
• Robots: In parallel with the development of 6G, the evolution of robots and
autonomous systems will continue, and robots are envisioned to become part
of everyday life, both in professional and personal settings. They will collabo-
rate and interact with each other, but also with humans. The generalization of
robots will increase productivity but will also offer solutions to assist humans
in their daily lives, meeting societal demands such as care of disabled persons.
Although many aspects of this use case may be served by existing technolo-
gies, the increased demands for concurrent reliability, high bitrate, and low
latency necessitate novel approaches.
• Twinning: The concept of DT will be extended in 6G, generalizing the
use of the full digital representation of an environment to enhance control,
20 Architecture Landscape
6G requirements
Like the use cases, requirements for 6G can also be categorized into the evolution
of key performance indicators (KPIs), e.g., higher throughput, lower latency, and
revolution of novel KPIs (Figure 2.2). These novel KPIs explicitly focus on the
E2E view required by novel 6G use cases, such as E2E dependability or service
The Need for a New Architecture 21
New capabilities
Localization and
Communication AI and Computation ...
Sensing
Availability
Dependability
Reliability
Safety
QoS Attributes
Integrity
QoS Attributes
QoS Attributes
Maintainability
Service latency AI Service RTT Location/orientation accuracy
...
This section presents the overall direction that the 6G architecture should move
towards to fulfil the trends and technology evolutions. This is done by defining a
set of architectural principles and followed by a high-level E2E architecture view.
22 Architecture Landscape
Network
simplification in
Extensibility
comparison to
and flexibility
previous
generations
Architectural
Principles
Separation of
concerns of
Scalability
network
functions
Exposed Resilience
interfaces are and
service based availability
Principle 4: Scalability
The network architecture needs to be scalable both in terms of supporting very small to
very large-scale deployments, by scaling up and down network resources based on needs.
planning, deployment, operations, and the entire equipment life cycle. These
aspects can be effective in achieving sustainability in all layers and levels of the archi-
tecture, namely at deployment levels that include architectural and hardware inno-
vations, at management and orchestration levels that target network operation
efficiency maximization, at service/application layers, such as application-aware
networks, and at cross-layer sustainability enablers that include innovations
in two or more layers. Detailed information on these enablers can be found in
Chapter 6.
The NS layer is envisioned to be cloud- and micro-service-based with functions
and microservices expanded from central cloud to the edge cloud (see Figure 2.4).
One of the key technology enablers of the NS layer is the introduction of the
extreme edge cloud (see Figure 2.4)). Extreme edge cloud covers part of the net-
work with high heterogeneity of devices with a wide variety of technologies, in
terms of both hardware and software. These devices could be personal devices
(smartphones, laptops, etc.) and a huge variety of IoT devices (wearables, sensor
networks, connected cars, industrial devices, connected home appliances, etc.).
The concepts of edge and extreme edge computing become more and more rel-
evant for the 6G architecture and services. Microservice-based implementation can
provide improvements towards a softwarized, intelligent, and efficient 6G archi-
tecture. Chapter 5 describes the enablers for an intelligent network. The ultimate
target for the 6G architecture is to enable autonomous and adaptable networks,
with no (or minimal) human intervention, leveraging cognitive, closed-loop con-
trol network functions that can be instantiated on an on-demand basis, even across
network domain boundaries. In this sense, an intelligent 6G architecture should
be able to define the underlying mechanisms to support embedded AI for 6G and
ensure dynamic adaptability of the network architecture to new use cases while
keeping the infrastructure and energy costs at acceptable and sustainable levels.
Another important aspect of a more flexible and intelligent network is pro-
grammability, addressed in detail in Chapter 7. Programmability can be a tool to
introduce new features, especially to deployments that have a limited footprint due
to limited hardware types and specific requirements. Over the last decade, pro-
grammability is significantly enhanced thanks to the software-defined networking
(SDN) paradigm as well as the ongoing trend towards softwarization and cloudi-
fication. For 6G architecture, this trend is expected to continue in order to allow
third-party developers to interact with the network in new ways, and 6G architec-
ture is expected to ensure reusability and flexibility.
Furthermore, with a cloud-native approach, the RAN and CN architectures
can be streamlined, e.g., reduce some complexity by removing multiple process-
ing points for a certain message and removing duplication of functionalities among
functions [30].
26
AI/ML
Security
Exposure Framework and Integraon Fabric
Quantum
Security
Privacy
Extreme/Far Edge Edge Cloud Central Cloud Enhancing
Technologies
Physical
Cloud infrastructure
Quantum
Security
Control Plane Network Functions
Sensing Stratum
User Plane Network Functions Network Stratum
Intelligence Stratum
Physical
Cloud infrastructure
Figure 2.5 Functional view of the proposed 6G reference architecture with the focus on the stratums.
Architecture Landscape
The Need for a New Architecture 29
composed of the set of planes that traditionally build the mobile network
architecture and has done so since the earliest releases of the 3rd generation part-
nership project (3GPP) standards. In this context, and by borrowing and extending
the terminology from the 3GPP system, a stratum is defined as a set of coordinated
functions that is running in different planes or domains of the network. For the
proposed functional architecture, four stratums on Network, Sensing, Security &
Privacy, and Intelligence have been introduced.
Network stratum is consisted of network functions in control plan (CP) and
user plan (UP) that are responsible for delivering the expected QoS, efficiently
allowing user equipment (UE) to exchange data with the network. CP and UP
entail novel access technologies, which may also include the ones leveraging sub-
terahertz bands and visible light communications; AI-native air interface, arranged
in specific ways (e.g., cell free networks [33, 34]), and even including extreme
edge functions like the ones that are managing and reconfiguring intelligent meta-
surfaces.
Traditionally, the non-access stratum included functions from the UE, UP, and
CP. The network intelligence stratum encompasses and coordinates functions
in all networks, ranging from the intelligent operation of network functions to
their autonomous management and orchestration. The network intelligence stra-
tum gathers data and analytics from the infrastructure layer.
The infrastructure can be extended to include environmental aspects (i.e., the
environment where the infrastructure is deployed, and functions are executed) to
allow a tight interaction between the network and the surrounding space. Properly
steering beams at very high frequencies or using unmanned aerial vehicle (UAV)
to extend the network’s coverage requires a sensing stratum that can efficiently
coordinate functions, harvesting data from fixed landmarks or dynamic laser/light
imaging, detection, and ranging (LIDAR) scans, or even using the UP wireless
technology as an additional source of sensing, possibly in an energy harvesting
fashion.
The last stratum is the security & privacy stratum, which manages the cyber
security and data privacy aspects of the network. This stratum coordinates functions
in all the planes and domains of the network up to the vertical service provider
one, which also benefits from the enhanced 6G security and cooperates with it
to minimize the attack surface, while allowing the service customers to have full
control over the data (including the network one).
Clearly, this richness in the available network functions, which have to be
arranged and properly configured according to the network slices they belong to,
poses new challenges to the management plane of the network, see Section 2.4.
This interaction is possible thanks to the enhanced exposure interface between
the network and the vertical service providers on the application layer, through the
30 Architecture Landscape
use of network applications, which can leverage on data, functions, and procedures
offered to support and enhance the user experience. Through the exposure inter-
face, the traditional barrier between operators and service providers is removed,
allowing a white-box customization of the vertical services.
Figure 2.6 shows the overall architecture, visualizing the applicable security and pri-
vacy components in all areas, and highlighting the specific 6G security technology
enablers. While the focus lies on the technology enablers as new architectural com-
ponents, a holistic 6G security architecture must also comprise today’s well-proven
security mechanisms, as far as they are still relevant in 6G. On this basis, Figure 2.6
summarizes these components, without the aspiration of exhaustiveness and depth
of detail.
Figure 2.6 distinguishes among non-virtualized equipment (for radio access and
optical transport), the cloud infrastructure, and the software running on it, includ-
ing the virtualization layer, the logical network layer, and the management and
orchestration functions, including security and risk management and inter-domain
management. In each part, the figure shows the most relevant security and privacy
building blocks or architectural components, with the new 6G security technol-
ogy enablers highlighted in red, and the more traditional building blocks, like for
example “Secure SW,” in blue.
Many building blocks apply to multiple areas, e.g., “Secure SW ” applies to the
non-virtualized radio and optical equipment (as far as this equipment comprises
software), to the virtualization layer, and to all the software running on it, including
M&O functions. As another example, “Trust foundations” apply to all hardware,
i.e., the radio and optical equipment as well as the cloud infrastructure. On the
other hand, some building blocks appear in dedicated places only, like “Distributed
ledger technologies” appearing at inter-domain management only, but this does not
preclude the potential applicability of the building block in other areas. Also, when
a building block appears in an area, this does not imply that the building block
is always applicable. For example, certain non-virtualized radio access equipment
may not have access to sensitive data, so no privacy-enhancing technologies may
be required here. As another example, obviously not all transport equipment is
required to support quantum key distribution.
The traditional security building blocks may be mostly self-explaining, but note
the following:
• “Secure SW” refers to software with a low (close to zero) degree of vulnera-
bility. “Secure HW/FW” has the same meaning for hardware or firmware. An
Secure SW Secure protocol & API design Cloud-based Software
Secure AI/ML Privacy enhancing technologies Quantum-safe cryptography
“Classical”
management RAN Equipment Privacy enhancing Optical Equipment
security
technologies
mechanisms Physical layer security Quantum key Infrastructure Layer
Jamming protection Secure AI/ML distribution
Service M&O deals with the deployment and operation of the NSs supplied
through the mobile network operator (MNO) to their customers, preserving all of
the contractual aspects associated to those services. It addresses the provision of ser-
vices, QoS and quality of experience (QoE) fulfilment, or fault reporting, among
others. In previous generations of the mobile communications systems, the cus-
tomers of the MNOs have been mainly individuals consuming voice and messaging
services. However, the market situation is much more complex now, including new
data services and corporate customers, such as vertical industries, digital operators,
hyper-scalers, or large-scale content providers, among others. It is anticipated that
this trend, in terms of heterogeneity of stakeholders and provided services, could
continue and even experience growth within the coming years.
To cope with this complexity, it is needed to enable the services M&O sys-
tems with the required capabilities to provide the necessary orchestration resources.
Specifically, the following main capabilities have been identified for the future 6G
M&O systems.
The adoption of the cloud-native principles also in the M&O system.
This would be aligned with the E2E architectural concepts in Section 2.2.2, but
from the M&O perspective, it would involve three main aspects: (i) the prior-
ity on using micro-services, i.e., light-weight self-contained, independent, and
reusable components from different suppliers; (ii) the implementation of the service
mesh concept, regarding the communication among the network components; and
(iii) the enabling mechanisms for the NSs to be deployed/updated using “contin-
uous” DevOps-like practises, e.g., implementing CI/CD workflows with a high
automation degree.
Unified M&O across multiple domains that could be owned/administered
by multiple stakeholders and featured with heterogeneous technology resources.
This entails the definition of converging interfaces, the mechanisms to dynamically
Service Management and Orchestration 33
check and expose the different resources and capabilities from each domain, and
the access control procedures for consuming the various primitives and services.
Increased degree of automation to strongly reduce manual interventions
regarding the functionalities of service and network planning, design, provision-
ing, optimization, and operation/control, leveraging closed-loop and zero-touch
responses. The M&O system needs to be able to identify, detect, or predict poten-
tial issues, triggering automatic reactions.
Adoption of data-driven and AI/ML techniques in the M&O system. AI/ML
techniques could cover numerous optimization aspects and lifecycle actions con-
cerning the services M&O, including resource allocation and slice sharing at pro-
visioning time, service composition, scaling, migration, re-configuration, and re-
optimization of NSs, among others.
Intent-based approaches for service planning and definition. In order to
help with the extended complexity, the M&O system would implement automated
mechanisms for translating service specifications and commands based on high-
level intents, which might be expressed even in natural language (e.g., relying on
AI/ML techniques).
To meet these main challenges, the M&O system is seen as a common function-
ality impacting all layers of the E2E architecture: from the infrastructure up to the
applications (see Figure 2.7). In this regard, an initial high-level M&O architectural
design for the future 6G networks has been produced. This architectural design
takes the previous 5G architectural view from the 5G PPP Architecture Working
Group as a baseline [34, 35] represents the structural view of this architecture, with
the main building blocks grouped in different layers.
The NSs and slices at the service layer (top in Figure 2.7) are executed on the
infrastructure layer (bottom) through the network functions at the network ser-
vice layer (middle). All these elements (network functions, services, and slices) are
designed and provided from the design layer (right).
A new layer, named the design layer, has been included to represent the M&O-
related operations involving third-party software providers. This is intended to
introduce the well-known DevOps-like practises (e.g., continuous integration and
continuous delivery/continuous deployment (CI/CD)) in the telco-grade environ-
ment. Also, hyperscalers, private networks, and the extreme edge domain have
been explicitly included as part of the infrastructure layer. New control loops have
been included: (i) the “DevOps control loop,” representing the automated con-
tinuous iterations (e.g., CI/CD) between the MNO scope (grey colour) and the
external design layer (light blue colour); and (ii) the “infrastructure control loop,”
meant to automate the infrastructure discovery processes and the related monitor-
ing methods targeting the extreme edge asset integration (which can be potentially
asynchronous in terms of connection/disconnection of devices, so requiring special
34
M&O Scope
Service Layer (for Vercals) – E2E Slice specific realizaon Design Layer
• Service creaon and
Slice Instance #1 Service D operaon (SA & Service
Implemented though NetApps and
Service B fulfillment control Layer
User Plane, Access, Mobility loops)
Service A Control Service Layer
Service C Management and Session • Intent-based service Design
Management Funcons management Loops M&O
System
Slice Instance #2 • Service Quality Mgmt. Security
• Data aggregaon
Security
Security SW &
Slice Instance #n
Descriptors
Design
Network Layer Network Layer DevOps /
Radio Access Transport Net. Security Management M&O
Made AIOps
Funcons Funcons Funcons Use Funcons of Security Framework
AI AI AI
Security
Security
Primarily
implemented Intent-based
AI AI Network service
through CNFs.
Layer definions
Also, through Use Use Control
VNFs, PNFs or
API Management Exposure
Loops
other NFs Core Network Third Party AI/ML Monitoring
implementao Funcons Funcons Funcons Funcons • NFs LCM
AI AI AI AI
n technologies • Monitoring DevOps
• AI/ML orch. Control
AI AI
acons
• Security policies
Loops
SW
• AI Models
• Predicon
• Data
Infrastructure Layer analycs
Edge • AI Federaon
cloud Infra. Layer Infrastructure
Control Layer M&O
Loops Security
Security
Security • API registry
Extreme-edge Transport Core/Central • API discovery
Cloud • Infrastructure
• Access
discovery
Control
• Monitoring
External
Public Networks Private Networks Infrastructure
Figure 2.7 Proposed 6G management & orchestration system – structural view [34].
Architecture Landscape
Summary and Outlook 35
processes for their management). As in the baseline architecture in [35], NFs are
associated in different groups at the network layer (e.g., radio access functions,
CN functions, M&O functions, AI/ML functions, etc.). However, following the
cloud-native practises, these functions would be primarily implemented through
containerized NFs (CNFs), although also through virtualized NFs (VNFs), phys-
ical NFs (PNFs), or other NF implementation technologies (e.g., to ensure back-
ward compatibility). It should be noticed here that, although some functions work
only as managed resources (e.g., CN functions or third-party functions), others are
specific M&O resources (e.g., the monitoring functions or the management func-
tions themselves); however, other functions are hybrid : they can support M&O
resources (e.g., certain security-related or AI/ML functions) or work as pure man-
aged resources (e.g., certain AI as a Service (AIaaS) functions or security functions
not in the M&O scope). Functions in the network layer are generic, i.e., instead
of referring specific functions (e.g., communication service management function
(CSMF), media resource function (MRF), NFV orchestrator (NFVO), etc.) as
in [35], just generic blocks are provided. This is intentional, in order to consider
the new functions that would be probably defined for the future 6G stack. A new
set of AI/ML collaborative components have been distributed across the network
covering both managing and managed scopes. M&O functions can be instantiated
in the three different layers (service, infrastructure, and network layers), including
specific security-related functions. Finally, and also aligned with the cloud-native
approach, a new cross-layer API management exposure block has been included
to communicate the different network elements in the different network layers. In
short, it mimics the behaviour of the zero-touch service management (ZSM) cross-
domain integration fabric, enabling the so-called capabilities exposure of the network
of elements in the various architectural layers. It makes possible communicating
the various M&O resources within and between administrative domains, although
it could be applied more broadly to represent potential federated interactions.
This chapter discusses the current architectural trends and technologies for the
future 6G network. Motivated by the surge of new requirements stemming from
societal trends and use cases, a set of architectural principles has been introduced,
and new architectural and technical enablers needed for the 6G architecture have
been identified. A high-level view of a possible E2E system of the 6G architecture as
well as a functional view is described. Thereafter, a description on how the enablers
fit into the system view is given, which is also an overview of the content in this
book. The chapter dives into the security and privacy area in a bit more detail and
36 Architecture Landscape
References
[1] United Nations (UN), “Transforming our world: the 2030 Agenda for Sus-
tainable Development,” 21 October 2015. Accessed: April 6, 2023. [Online].
Available: https://sdgs.un.org/2030agenda.
[2] Ericsson, “6G – Connecting a cyber-physical world,” February 2022.
Accessed: April 6, 2023. [Online]. Available: https://www.ericsson.com/4
927de/assets/local/reports-papers/white-papers/6g--connecting-a-cyber-ph
ysical-world.pdf .
[3] Nokia, “Communications in the 6G era,” 9 September 2020. Accessed: April
6, 2023 [Online]. Available: https://onestore.nokia.com/asset/207766.
[4] GSM Association, “2022 Mobile Industry Impact Report: Sustainable Devel-
opment Goals,” September 2022. Accessed: April 6, 2023. [Online]. Avail-
able: https://www.gsma.com/betterf uture/wp-content/uploads/2022/11/2
022-SDG-Impact-Report.pdf .
[5] M. Matinmikko-Blue, S. Aalto, M. I. Asghar, H. Berndt, Y. Chen, S. Dixit,
R. Jurva, P. Karppinen, M. Kekkonen, M. Kinnula, and P. Kostakos, White
paper on 6G drivers and the UN SDGs, University of Oulu, June 2020.
Accessed: April 6, 2023. [Online]. Available: http://urn.fi/urn:isbn:9789
526226699.
[6] G. Fettweis, “6G – Just a better 5G?: 2020 5G World Forum keynote series,”
18 November 2020. Accessed: April 6, 2023. [Online]. Available: https://ieee
tv.ieee.org/2020-5g-world-forum-keynote-gerhard-fettweis.
[7] N. Demassieux, “6G. Why?,” In EuCNC 2020, Dubrovnik, Croatia, 2020.
Accessed: April 6, 2023. [Online]. Available: https://www.eucnc.eu/wp-cont
ent/uploads/2020/07/2020-05-29-6G.-Why-Nicolas-Demassieux-EUCN
C-VDEF.pdf .
[8] Samsung, “The Next Hyber-Connected Experience for All,” 14 July 2020.
Accessed: April 6, 2023. [Online]. Available: https://cdn.codeground.org/nsr
/downloads/researchareas/20201201_6G_Vision_web.pdf .
[9] NTT DOCOMO, “White paper 5G Evolution and 6G, version 5.0,” January
2023. Accessed: April 6, 2023. [Online]. Available: https://www.docomo.ne.
jp/english/binary/pdf/corporate/technology/whitepaper_6g/DOCOMO_
6G_White_PaperEN_v5.0.pdf .
[10] Raconteur, “The economic impact of 5G,” 2020. Accessed: April 6, 2023.
[Online]. Available: https://www.raconteur.net/infographics/the-economic-
impact-of-5g/.
References 37
[23] Hexa-X, “D1.3 – Targets and requirements for 6G – initial E2E architecture,”
28 February 2022. Accessed: April 6, 2023. [Online]. Available: https://ec.e
uropa.eu/research/participants/documents/downloadPublic?documentIds=0
80166e5e90431aa&appId=PPGMS.
[24] 6G Infrastructure Association, Vision and Societal Challenges Working
Group, Societal Needs and Value Creation Sub-Group, “What societal values
will 6G address?,” May 2022. Accessed: April 6, 2023. [Online]. Available:
https://5g-ppp.eu/wp-content/uploads/2022/05/What-societal-values-will
-6G-address-White-Paper-v1.0-f inal.pdf .
[25] Hexa-X, “D5.1 – Initial 6G architectural components and enablers,” Decem-
ber 2021, Accessed: April 6, 2023. [Online]. Available: https://ec.europa.eu/r
esearch/participants/documents/downloadPublic?documentIds=080166e5e
652c1f 2&appId=PPGMS.
[26] M. Ericson, S. Wänstedt, M. Saimler, H. Flinck, G. Kunzmann, P. Vlacheas,
P. Demestichas, D. Rapone, A. De La Oliva, C. J. Bernardos, and R. Bassoli,
“Setting 6g architecture in motion–the hexa-x approach,” In 2022 Joint Euro-
pean Conference on Networks and Communications & 6G Summit (EuCNC/6G
Summit), June 2022.
[27] Hexa-X, “D3.2 – Localisation and sensing use cases and gap analysis,” Septem-
ber 2022. Accessed: April 6, 2023. [Online]. Available: https://ec.europa.eu/r
esearch/participants/documents/downloadPublic?documentIds=080166e5e
648d02a&appId=PPGMS.
[28] Hexa-X Deliverable “D5.2 – Analysis of 6G architectural enablers’ applica-
bility and initial technological solutions,” October 2022, Accessed: April 6,
2023. [Online]. Available: to appear in https://cordis.europa.eu/project/id/
101015956/results.
[29] Hexa-X Deliverable “D2.1 – Towards Tbps Communications in 6G: Use
Cases and Gap Analysis” June 2021. Accessed: April 6, 2023. [Online]. Avail-
able: https://ec.europa.eu/research/participants/documents/downloadPubli
c?documentIds=080166e5df2529f d&appId=PPGMS.
[30] E. U. Soykan, L. Karaçay, F. Karakoç, and E. Tomur, “A Survey and Guideline
on Privacy Enhancing Technologies for Collaborative Machine Learning,” In
IEEE Access, vol. 10, pp. 97495–97519, Sep 2022.
[31] N. Rajatheva, I. Atzeni, E. Björnson, A. Bourdoux, S. Buzzi, J. B. Dore,
S. Erkucuk, M. Fuentes, K. Guan, Y. Hu, and X. Huang, J. Hulkkonen,
J. M. Jornet, M. Katz, R. Nilsson, E. Panayirci, K. Rabie, N. Rajapaksha,
M. J. Salehi, H. Sarieddeen, T. Svensson, O. Tervo, A. Tolli, Q. Wu, and
W. Xu, “White paper on broadband connectivity in 6G,” In arXiv preprint
arXiv:2004.14247. April 2020.
References 39